The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The reliability of automated system management solutions will increase in importance as the use of cloud computing and data centres expands. As part of a study to improve reliability, this paper provides a classification of faults that can occur in automated system management and proposes a method for determining the severity of such faults. A baseline deployment is compared with an alternate proposed...
Inspired by the reliability maintenance mechanisms in biology systems, based on bio-network platform, a reliability design model for next-generation network is proposed. In designing the structures of bio-network and bio-entity, the reliability mechanisms are incorporated to gain the reliability maintenance capability when the entities delegate the function entities in the next-generation network...
Excessively complex web site features will increase consumer transaction costs, it is important to reveal the impact of different functions on improving the design of site structure, reducing transaction costs and increasing consumerspsila purchase intention. This paper adopts the method of factor analysis and factor sorting to study the influencing factors on Chinese consumerspsila purchase intention...
Many applications in Wireless Sensor Networks require collecting all data without loss from nodes. End-to-End data retransmission, which is used in the Internet for reliable transport, becomes very inefficient in Wireless Sensor Networks, since wireless communication, and constrained resources pose new challenges. We look at factors affecting reliability, and search for efficient combinations of the...
With rapid growth of the Internet and the globalization of the market, companies accepted and adopted the new information and communication technology in the performance of their activities, not only to support traditional activities, but also to support those arising from new opportunities, mainly from the Internet. This paper addresses the e-service quality issue in the electronic marketplace. The...
Our goal is to propose a unified/generalized model for the Wireless Mesh Networks (WMNs) design problem taking into account all the parameters that have a significant impact on WMNs. In the WMNs design literature, different studies take into account traffic demand, interference, multi-channel, transmission power, potential locations of wireless routers/gateways and node's characteristics (number of...
This paper presents a suite of reliability mechanisms for P2PSIP-based conference services. These mechanisms can be divided into two categories. One is backup mechanism, which is designed to elect backup conference provider in a distributed and dynamic manner among all the participants of conference. The other category contains handover and failover mechanisms, which are designed to maintain continuous...
This article proposes methods for modeling supply chain reliability stochastically in electronic environment. On Internet today, a supply chain becomes very complex, as simultaneously connecting the supplier, the manufacturer, the distributor and the user. Therefore, we had to consider the situation of many suppliers to many demanders instead of single to many or many to single under the electronic...
In this paper, we present a new technique to improve the reliability of H-tree SRAM memories. This technique deals with the SRAM power-bus monitoring by using built-in current sensor (BICS) circuits that detect abnormal current dissipation in the memory power-bus. This abnormal current is the result of a single-event upset (SEU) in the memory and it is generated during the inversion of the state of...
In this paper, we introduce and evaluate ScaleMesh, a scalable miniaturized dual-radio wireless mesh testbed based on IEEE 802.11b/g technology- ScaleMesh can emulate large-scale mesh networks within a miniaturized experimentation area by adaptively shrinking the transmission range of mesh nodes by means of variable signal attenuators. To this end, we derive a theoretical formula for approximating...
This paper describes a methodology for building a reliable internet core router that considers the vulnerability of its electronic components to single event upset (SEU). It begins with a set of meaningful system level metrics that can be related to product reliability requirements. A specification is then defined that can be effectively used during the system architecture, silicon and software design...
This paper describes the initial design, development and testing of a tool that harvests reliability data from multiple internet resources. An evaluation corpus of 1544 URLs is used to assess typical reliability data collection content and challenges and to provide a basis for evaluating data harvesting tool performance and capability growth. Early results show that the ability to handle portable...
Accelerated by the rapid deployment of distributed systems and the Internet, online collaboration and information sharing are pervasive in enterprise computing environment. With regard to the requirements of online collaboration and information sharing, authentication information needs flexible manipulation to facilitate federation across trust domains. To achieve identity federation for federated...
Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. In WSNs, a malicious node may initiate incorrect path information, change the contents of data packets, and even hijack one or more genuine network nodes. As the network reliability completely depends on individual nodespsila presence...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.